Datamation Logo
Home
Authors
Posts by Richard Adhikari

Richard Adhikari

VMware May Be Hit Hard by Hypervisor Error

Applications
August 18, 2008

Sometimes it pays to wait a few weeks. VMware introduced Update 2 for both its ESX 3.5 hypervisor and ESXi 3.5 free hypervisor at the end of July with much fanfare. Then, at midnight on August 12, both went awry. A piece of code in the hypervisor expired the products, which meant that users could […]

Inadequate Tools Send Software Down the Drain

Applications
August 15, 2008

Fortune 500 companies abandon more than one-third of software-development projects after implementation because they don’t meet user needs, according to a study released today by analyst firm Voke Media. The survey was conducted from April through July. That sees a lot of money squandered — the average project costs $3.2 million and requires almost 1,300 […]

The Mainframe Still Lives

Networks
August 12, 2008

Listen up, boys and girls, the mainframe is not dead; in fact, it’s very much alive. Every few years, people predict that the mainframe is on its last legs and will be taken over by the technology du jour. That replacement technology has ranged over the years from client-server computing to Web-based computing, and, now, […]

IBM Unveils Proactive E-Discovery Solution

Applications
August 12, 2008

IBM has unveiled eDiscovery Manager, a software product that lets enterprises manage electronically stored information so that they can retrieve it easily when a legal challenge requires e-discovery. The term e-discovery stands for ‘electronic discovery’ and refers to discovery in civil litigation dealing with information in electronic form. Enterprises are being forced to adopt e-discovery […]

New VM Templates Leave Oracle’s Drawing Board

Applications
August 11, 2008

If setting up and implementing Oracle environments makes your database administrators break out in a sweat, help may be at hand. Yesterday the company announced its VM Templates suite, which combines Oracle’s Database 11G, Enterprise Manager 10g, Siebel CRM 8 and Enterprise Linux. All of the apps come preinstalled and preconfigured. Database administrators just copy […]

Citrix CTO Eyes the Future of Virtualization

Networks
August 8, 2008

SAN FRANCISCO — Vendors of virtual machines must ensure their products are interoperable, or they will lock customers into yet another proprietary stack, nullifying the promise of anytime, anywhere computing on any platform offered by virtualization. This was the major theme of Citrix Systems (NASDAQ: CTXS) chief technology officer Simon Crosby’s keynote speech Thursday at […]

The Pitfalls of Open Source Litigation

Open Source
August 8, 2008

SAN FRANCISCO — Optimists say the best things in life are free; realists say yes, but anything that’s free costs way too much. Nowhere is that more applicable than in open source (define) software. Enterprises using open source are being sued for not complying with the multitude of licenses the software comes with. The problem […]

Networks: The Crux of Tomorrow’s Datacenter

Networks
August 7, 2008

Source: LinuxWorld SAN FRANCISCO — As enterprises virtualize their environments and move toward the next-generation datacenter, the network will enable this move, Rajiv Ramaswami, vice president and general manager of Cisco, said yesterday. In his keynote speech yesterday at the Next Generation Data Center and LinuxWorld conferences, held concurrently at San Francisco’s Moscone Center this […]

Big Bucks Lure New Blood in Virtualization Tools

Applications
August 5, 2008

A slew of contenders old and new are coming out swinging in the market for add-on software and services for virtualization. The latest contenders looking for a share of the enterprise virtualization dollar are focusing on monitoring and management software and virtualized test management. These are key support technologies to ensure compliance and make sure […]

Insider Data Thieves Are the Worst

Security
August 3, 2008

While crime fighters are buzzing about malware (define), SQL injections (define), phishing(define) and other similarly fascinating acts by cybercriminals, the really bad guys are within the corporate firewalls. A study conducted in late 2007 by ID Analytics, which offers identity intelligence on demand, found that from three to 36 percent of identities stolen by internal […]

Page 7 of 11
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.